Splunk Search

Select multiple lines into a new filed

3amer92
Explorer

Hello!

So I'm new to Splunk, and I have a very long event but I'm only interested in the below two lines (there are a lot of lines above and below these two lines):

 

05:54:24.100 [33140] [BAF3E974-33AA-4651-FF04-12355EF15677] POST  <<  https://xx.xx.xx/xx/xxx/xxxx/xxx/
---------- MAX REQUEST TIME WARNING (100000 ms)

 

 Is there any way to get only these two line into a new field?

Labels (3)
0 Karma
Get Updates on the Splunk Community!

Modern way of developing distributed application using OTel

Recently, I had the opportunity to work on a complex microservice using Spring boot and Quarkus to develop a ...

Enterprise Security Content Update (ESCU) | New Releases

Last month, the Splunk Threat Research Team had 3 releases of new security content via the Enterprise Security ...

Archived Metrics Now Available for APAC and EMEA realms

We’re excited to announce the launch of Archived Metrics in Splunk Infrastructure Monitoring for our customers ...